Skip to main content

Curated research library of TV news clips regarding the NSA, its oversight and privacy issues, 2009-2014

Click "More / Share / Borrow" for each clip's source context and citation link. HTML5 compatible browser required

Primary curation & research: Robin Chin, Internet Archive TV News Researcher; using TV News Archive service.

Speakers

Joie Chen
Anchor of Al Jazeera America, America Tonight
ALJAZAM 10/16/2013
Joie Chen: The latest, according to the "the Washington Post" involves hundreds of millions of email contact lists. And, yes, yours could potentially be among them. The latest disclosures again highlight the reach of the agency in it’s efforts to guard against national security threats
Joie Chen
Anchor of Al Jazeera America, America Tonight
ALJAZAM 10/16/2013
Joie Chen: the data drawn from address books and instant messaging contact lists at collection points across the globe could allow the NSA to map out a person's life. The Foreign Intelligence Surveillance Act prohibits the NSA from deliberately targeting Americans, whether they are in the U.S. or abroad. And the agency has not been authorized by Congress or the special court that oversees foreign surveillance the so called FISA Court, to collect contact lists of Americans in bulk.
Joie Chen
Anchor of Al Jazeera America, America Tonight
ALJAZAM 10/16/2013
Chen: But the leaked document shows that contact lists and address books belonging to some Americans are being gathered up in the data dragnet. The NSA claims this is not in direct violation of the Foreign Intelligence Surveillance Act because the collection occurs in foreign countries, when data crosses international borders.
Keith Alexander
General, Director of the National Security Agency, Chief of the Central Security Service and Commander of the United States Cyber Command.
ALJAZAM 10/16/2013
Chen: At a Senate judiciary hearing earlier this month, NSA Chief General Keith Alexander dismissed charges of massive infringement on personal privacy. Alexander: The press claimed evidence of thousands of privacy violation. This is false and misleading. Chen: The agency claims it is not legally required or technically able to restrict it’s intake to contact lists belonging to specified foreign investment targets.
Ashkan Soltani
Washington Post contributor, Independent researcher and consultant focused on privacy, security, and behavioral economics
ALJAZAM 10/16/2013
Soltan: (NSA) actually been able to capture the data without going to the companies or without the company's involvement. By possibly through the company's negligence,, but in fact the truth of the matter is rather than having to go knock on a door with a legal requirement, they can just collect it themselves. And in fact they are over-collecting. Chen: how much? Soltan: So we’re told they are collecting on any given day somewhere around 440,000 email addresses from yahoo... Chen: 440,000 a day? Soltan: address books a day. Somewhere in the 700,000 a day address books from various big four web mail providers.
Ashkan Soltani
Washington Post contributor, Independent researcher and consultant focused on privacy, security, and behavioral economics
ALJAZAM 10/16/2013
Soltan: What’s not clear is what the minimization guidance is or what the target guidance is. We know from other leaked documents that for example minimization guidance or targeting guidance on the 702 precedent is that you can effectively - it's not a precedent, the 702 guidelines allow you to collect information on anyone who is corresponding or has in their address book a foreign intelligence suspect. So what happens here, it's not clear what information they are collecting, but -- Chen: or why
Ashkan Soltani
Washington Post contributor, Independent researcher and consultant focused on privacy, security, and behavioral economics
ALJAZAM 10/16/2013
Chen: weed this out, it's splitting hairs. Is it really that difficult, would it be that difficult for them to isolate just the information that they need? Soltan: Not the way they are collecting it. They are connecting it from the backbone of the internet. They collect it as the data goes by rather than data at rest. As data goes by through these pipes, through what are known as SIGADs, these links between the internet of various countries. They are able to collect this data and record it and access it.
Joie Chen
Host of America Tonight
ALJAZAM 01/30/2014
Chen: Whistleblower Edward Snowden has been nominated for the Nobel Peace Prize.The irony though is that he could share the same honor as the President who revoked his passport, Barack Obama. Wednesday on the hill the senate intelligence committee warned the panel that Snowden remains a threat to this nation's security.
Showing 1 through 8 of 8
Page 1